Reader small image

You're reading from  Splunk 9.x Enterprise Certified Admin Guide

Product typeBook
Published inAug 2023
PublisherPackt
ISBN-139781803230238
Edition1st Edition
Right arrow
Author (1)
Srikanth Yarlagadda
Srikanth Yarlagadda
author image
Srikanth Yarlagadda

Srikanth is a highly accomplished IT professional with a diverse range of expertise in the technology industry. Having completed his Masters in Computer Applications in 2009, he has since honed his skills in Java, Oracle SOA, and API development, gaining valuable experience along the way. With over 13 years of experience in the field, Srikanth is now a Splunk Certified Architect and was recently selected to join the esteemed cohort of SplunkTrust in 2022. He has extensive knowledge of various Splunk products, including Splunk Enterprise Security and SOAR, and he is currently dedicated to Threat Detection and Security Automation using Splunk ES & SOAR. Srikanth's impressive work history includes significant roles at major telecom companies across Norway and Pan Europe. Beyond technology, Srikanth's greatest joy is his family. Along with his wife and two children, he calls Australia home and enjoys spending time together while staying active.
Read more about Srikanth Yarlagadda

Right arrow

Self-assessment

  1. Select the popular data input types offered by Splunk by default. (Choose all that apply):
    1. Binary file monitoring
    2. File and directory monitoring
    3. Network data input
    4. Scripted input
    5. Network port monitoring
  2. You are about to configure a file monitoring input and observe that the directory contains five-year-old data that does not need to be indexed. Which setting is used to force the forwarder to ignore the old files?
    1. skipHistoricalFiles
    2. ignoreOldData
    3. ignoreOlderThan
    4. deletePastData
  3. A network device can send traffic over UDP on port 514. You are an admin and need to allow incoming traffic from the network device IP. What setting is appropriate for this situation?
    1. acceptOnly
    2. acceptFrom
    3. connection_host
    4. acceptIPOnly
  4. You have been given the task of configuring the monitoring of files with the names network-sys-messages.log, sys-messages.log, and syslogs.log in a directory path of /opt/var/log/syslog/ on a Linux system. They all fit into a single source type – syslog...
lock icon
The rest of the page is locked
Previous PageNext Chapter
You have been reading a chapter from
Splunk 9.x Enterprise Certified Admin Guide
Published in: Aug 2023Publisher: PacktISBN-13: 9781803230238

Author (1)

author image
Srikanth Yarlagadda

Srikanth is a highly accomplished IT professional with a diverse range of expertise in the technology industry. Having completed his Masters in Computer Applications in 2009, he has since honed his skills in Java, Oracle SOA, and API development, gaining valuable experience along the way. With over 13 years of experience in the field, Srikanth is now a Splunk Certified Architect and was recently selected to join the esteemed cohort of SplunkTrust in 2022. He has extensive knowledge of various Splunk products, including Splunk Enterprise Security and SOAR, and he is currently dedicated to Threat Detection and Security Automation using Splunk ES & SOAR. Srikanth's impressive work history includes significant roles at major telecom companies across Norway and Pan Europe. Beyond technology, Srikanth's greatest joy is his family. Along with his wife and two children, he calls Australia home and enjoys spending time together while staying active.
Read more about Srikanth Yarlagadda